Undertheradar
scripts and other various binaries that afford the pentester EDR bypass resources
Install / Use
/learn @g3tsyst3m/UndertheradarREADME
undertheradar
Simple scripts I tinkered with that afford the pentester AV bypass options for l00ting the stuff you need
PSshell.ps1
Allows the pentester a means of executing commands on the remote machine via Powershell's Invoke-WmiMethod
We take advantage of using SMB file access and simply tail the file that receives our command output using Notepad++.
Here's how you can enable the Tail -f feature in Notepad++.
- Click View
- Select this:
Dumpy.py
Dumps SAM and SYSTEM files from registry for offline cracking
prompt.py
forces a windows username and password prompt to the victim's desktop and saves results to c:\users\public\creds.log
- automatically determines the current logged in user's username for you
- Forces user to continue trying until they get the password right OR they hit the cancel button
collecttheloot.py
Just a rough draft of me learning some logon winapi stuff using python.
this script attempts to find passwords in your chrome browser and within your wifi passwords and then tests them to see if any are valid. Does some other stuff too like check group memebership and OS version.
Depends on decryptbrowser.py
simplekeylogger
A very basic, stay under the radar keylogger!
